Mobile Access Trends
In the world of cybersecurity, ethical hacking proactively identifies security vulnerabilities before malicious actors (i.e., unethical hackers) can exploit them. By simulating real-world attacks, organisations can strengthen defences, protect sensitive data, and maintain public trust. In the physical security world, ethical hacking can transform cybersecurity of security systems from a reactive struggle into a strategic safeguard. We asked our Expert Panel Roundtable: What is the role of ethical hacking as it relates to physical security?
Next-generation (Next-Gen) technologies are products, services, or infrastructures that represent a significant leap forward rather than a small, incremental update. In the physical security industry, NextGen products are those that enable disruptive change, breakthrough performance, and a fundamental change that renders previous products obsolete. We asked our Expert Panel Roundtable: What is the next generation of physical security solutions, and how will they change the industry?
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
Latest Access control news
Global designer and manufacturer of coded locks, Codelocks International Ltd, has announces a new partnership with CES Security Solutions Ltd, a specialist in patented key systems. The collaboration makes selected Codelocks products compatible with CES Security’s patented key cylinders, combining two established access control technologies within a single, integrated solution. Bringing them together in this first line of products gives users the convenience and flexibility of coded access, along with the security and reliability of patented master keys. Access control technologies Colin Campbell, CEO at Codelocks International Ltd, said: “We’ve worked with CES on an ad hoc basis to give the customers who ask for it the ability to include their digital locks as part of their master key system. In addition, we receive regular enquiries – for a key that cannot be easily copied, and we can integrate these with our digital locks to provide a fully combined access control solution.” The CES Security key system is patented until 2038, meaning keys cannot be duplicated without authorisation. Each override key is individually registered with CES Security and is fully traceable, providing complete auditability of who was issued a key and when – a requirement increasingly expected in regulated environments such as healthcare, education, and government facilities, and in commercial offices. Providing complete auditability Three Codelocks products are the first to launch with this new functionality: the mechanical CL500 Key and CL600 locks, and the electronic CL5000. In addition to their existing features, these locks can now be configured into a CES Security master key system. Master key systems allow a single key to operate multiple locks while restricting individual keys to designated doors. This creates a tiered access structure that simplifies key management across large or multi-occupancy sites. Unlike other master systems, the CES Security Solutions provides a patented cylinder adapted to specifically operate Codelocks digital locks. Managing complex environments CES Security’s patented cylinders are also drop in, retrofit friendly, meaning existing Codelocks customers can easily upgrade their CL500 Key, CL600, and CL5000 locks. This gives existing customers the chance to create a master lock system or integrate their coded locks into their existing hierarchy. Mario Del-Signore, Managing Director at CES Security said: “This partnership will help larger users – whether in co-working offices, education or healthcare – manage their complex environments with reduced numbers of keys, greater confidence and security, and the simplicity of coded access.” Key cylinder range “We’re especially excited about the added value for locksmiths and installers, who can now add a patented master key system to an existing Codelocks installation and offer customers a more sophisticated solution as a result.” “The partnership itself grew naturally out of working together on several sizeable projects that were, in effect, an incredibly successful proof of concept. Dan Rising, our National Sales Manager, was instrumental in turning that into something formal, and I think what we can now offer reflects the strength of the CES-Codelocks relationship.” The Codelocks and CES Security Solutions Ltd registered key cylinder range is available now. They carry CE marking across the latch and lock variants and have been tested in accordance with BS EN 1634-12 for fire door applications when fitted with a Codelocks FireKit.
The Association of University Chief Security Officers (AUCSO) has agreed a major new sector collaboration with the National Association for Healthcare Security (NAHS) and Nu-ology Training to deliver accredited counter-terrorism protective security training for university and healthcare security professionals. The partnership marks an important step forward for both the university and healthcare security sectors. After many years of recognising the value of closer alignment, AUCSO and NAHS have come together, in collaboration with Nu-ology Training, to support a more joined-up approach to protective security preparedness across two sectors with many shared challenges. Supporting professional standards The collaboration will provide AUCSO and NAHS members with access to the SFJ Awards Level 3 Award in Counter-Terrorism Protective Security and Preparedness, developed in collaboration with the National Counter-Terrorism Security Office (NaCTSO) and designed to align with the Terrorism (Protection of Premises) Act 2025, also known as Martyn’s Law. As universities, hospitals and healthcare sites are among the UK’s most complex, open and publicly accessible environments, and frequently operate side-by-side across shared or adjacent estates, the partnership is designed to strengthen capability, support professional standards and help organisations prepare for the responsibilities introduced under the new legislation. Seeking specialist advice It also represents the first phase of a wider, future-focused training collaboration between AUCSO, NAHS and Nu-ology Training, with all three organisations keen to explore further opportunities to support professional development, resilience and preparedness across the sectors. The Level 3 qualification equips learners with the knowledge, skills and understanding to recognise terrorist attack methodologies, assess the likelihood of threats, and identify appropriate mitigation strategies. It also supports learners in understanding how to apply those strategies proportionately within their own operational settings, while recognising the limits of their own expertise and when to seek specialist advice. Joint training sessions SFJ Awards states that the qualification is the only one endorsed by Counter Terrorism Policing and NaCTSO, with the qualification developed to strengthen UK counter-terrorism protective security and organisational preparedness. Joint training sessions will be delivered by Nu-ology Training, an SFJ Awards-approved centre specialising in accredited programmes across the security, safety and resilience sectors. Founded and led by experienced practitioners, Nu-ology combines operational expertise with strong educational practice to deliver learner-centred, employer-focused training. Protective security nationwide Courses will be delivered regionally, with AUCSO and NAHS regional heads supporting arrangements for suitable classroom facilities. Places will be available on a first-come, first-served basis, with each course running for a minimum of eight and a maximum of 15 delegates. Regional delivery dates and locations will be announced shortly. A spokesperson from NAHS said: “This collaboration marks a significant moment for healthcare security. The introduction of the Terrorism (Protection of Premises) Act 2025 places new responsibilities on our sector, and our members need access to high-quality, accredited training that helps prepare them for what lies ahead. Working alongside AUCSO and Nu-ology allows us to strengthen capability across shared and complex estates and support a consistent, professional approach to protective security nationwide.” Future-focused training collaboration Geoff Brown, Chair, AUCSO said: “University campuses are dynamic, complex environments, often operating side-by-side with healthcare, research, transport and public spaces. The new legislation reinforces the importance of robust, informed and proportionate protective security. This partnership is a strong example of sectors coming together to share knowledge, build capability and support professional standards at a time when preparedness has never been more important.” Julie Barker, Chief Operating Officer, AUCSO said: “By partnering with NAHS and Nu-ology, AUCSO is helping to create a clear and accessible pathway for competence and preparedness across two sectors with many shared challenges. This is also the start of what we hope will become a wider and future-focused training collaboration. It is an exciting opportunity to build on the expertise of all three organisations and deliver real value for our members, our institutions and the wider communities we serve.” Nationally recognised pathway Claire Humble, Director, Nu-ology Training, said: “We are proud to support this important sector collaboration. The SFJ Awards / NaCTSO Level 3 Award in Counter-Terrorism Protective Security and Preparedness is a critical qualification at a critical time.” “By working with AUCSO and NAHS, we can deliver accessible, accredited training that strengthens resilience across healthcare and university environments. This partnership reflects a shared commitment to professionalisation, preparedness and public safety.” While the qualification does not in itself guarantee compliance with the Terrorism (Protection of Premises) Act 2025, it provides a structured and nationally recognised pathway for individuals and organisations seeking to build knowledge, confidence and capability in counter-terrorism protective security and preparedness.
Keepit, the world’s only vendor-independent cloud-native SaaS data protection platform, announces the appointment of James Dwyer as Chief Revenue Officer (CRO). In this role, Dwyer will lead Keepit’s global revenue organisation, with responsibility for scaling international go-to-market execution across sales, partnerships, customer success, renewals, and business development. Keepit is expanding at a time when organisations are more dependent than ever on SaaS applications, and when protecting and restoring business-critical data has become a board-level priority. At the same time, regulatory expectations and the rapid adoption of AI are increasing both data volumes and operational risk, putting renewed focus on resilience: keeping data available, trustworthy, and recoverable when disruptions occur. Key inflection points “James is a modern, people-first leader with a strong track record of scaling global go-to-market organisations at key inflection points,” said Morten Felsvang, CEO and co-founder of Keepit. “He understands what it takes to turn momentum into sustained performance, while building a high-accountability culture that keeps the customer at the centre. We’re excited to welcome James to Keepit as we continue our international expansion and help more organisations secure access to their SaaS data, no matter what the future holds.” Dwyer joins Keepit with senior leadership experience across the data security, data access, and data management ecosystem. He has built and scaled go-to-market teams through periods of rapid change, helping organisations translate technology differentiation into predictable growth. Business-critical SaaS data “Across my career, there’s been a consistent theme: data is the foundation companies are built on, and protecting it and ensuring access to it is mission critical,” said James Dwyer, Chief Revenue Officer at Keepit. “What drew me to Keepit is the combination of a high-stakes problem, strong market momentum, and a focused solution, delivered by a team with the talent and ambition to win. Keepit’s technology stands out because it’s purpose-built for the reality organisations face today: the need for dependable data protection, rapid recovery, and confidence that their business-critical SaaS data remains available.” Reality organisations face today Dwyer said the market is at an inflection point driven by deeper SaaS reliance, growing sovereignty and compliance requirements, and AI-enabled automation. He will focus on driving Keepit’s international growth by strengthening execution across markets and channels and deepening relationships with customers and partners who view data resilience as strategic. Felsvang added: “AI is changing how fast decisions are made and how quickly errors can propagate. That makes reliable backup and recovery, and confidence in your data, more important than ever. Keepit is built for that reality, and James will help us advance our business globally, to meet those needs.” Scalable revenue operations “We’re entering an inflection point where SaaS and AI are changing not just how data is created and used, but how quickly risk can spread,” Dwyer continued. “AI agents can accelerate operations, but they can also amplify mistakes and cascade misconfigurations faster than many organisations are prepared for. That’s why data resilience - knowing you can restore what matters, quickly and confidently - has become a defining capability. I’m excited to help Keepit scale globally and support customers as they navigate this new era.” Based in South Carolina, James Dwyer will work closely with Keepit’s leadership team to accelerate global execution across markets, channels, and customer segments - building aligned teams and scalable revenue operations as the company continues to grow.
The latest Cyber Security Breaches Survey makes for uncomfortable reading for UK businesses. According to the Government’s 2025/2026 report, 43% experienced a breach or attack in the last 12 months – that’s around 612,000 organisations. The findings also estimate approximately 5.19 million cybercrimes over the same period, while the proportion of breaches or attacks resulting in lost revenue or share value has more than doubled, rising from 2% to 5%. On a surface level, the story is familiar – cyber attacks remain widespread, phishing continues to dominate and businesses are once again being urged to improve resilience. Experts have already described the findings as depressingly familiar, and it’s not difficult to see why. The numbers move slightly from year to year, but the underlying pattern remains largely unchanged, which is the real concern here. National awareness campaigns After years of major incidents, boardroom briefings, regulatory warnings and national awareness campaigns, the UK is still stuck in a cycle where risk is recognised, but not consistently governed. Businesses know threat exists, but many still lack the ability to demonstrate, in a structured and reliable way, how that threat is being managed before something goes wrong. A breach shows the visible outcome of decisions, controls, gaps and assumptions that existed long before the incident itself. By the time a breach appears in a survey, the more important questions have already been missed: Were the right controls in place and were they being reviewed? Was there clear ownership? The answers to these determine whether an organisation is genuinely resilient or simply fortunate. Some areas of basic preparedness The survey tells us a great deal about the scale of cybercrime and reveals too many companies are still measuring risk at the point of failure rather than at the point of control. Only 31% of businesses have board-level responsibility for cyber security, just 15% review the risks posed by their immediate suppliers and only 6% look at the wider supply chain. The survey also points to small businesses going backwards in some areas of basic preparedness. Cyber security is still too often treated as a technical function, owned somewhere inside IT and discussed seriously only when an incident takes place. Yet most of the weaknesses exposed by modern incidents are structural, with no clear accountability, no consistent control framework, no live view of risk and no board-level visibility until they are already under pressure. Customer assurance process Smaller businesses are often told to adopt better cyber hygiene. Whilst this advice is valid, it can also oversimplify the challenge. SMEs typically operate with less internal capacity, fewer dedicated roles, more informal processes and greater dependence on external suppliers, creating a very different kind risk profile from larger enterprises. For many, cyber risk is managed through individual knowledge rather than institutional structure. One person knows where the policies are stored, one external provider understands the systems and one senior leader owns the customer assurance process, but that kind of system becomes fragile quickly. Last-minute effort The business needs clear visibility over the data it holds, the systems affected, the suppliers involved, the controls in place, what evidence exists and who is authorised to make decisions. If that information has not been organised in advance, incident response becomes slower and more expensive. This is where governance needs to become more practical. Smaller organisations don’t need the same level of bureaucracy as global enterprises, but they do need a clear way to map risks, assign ownership, manage controls, maintain evidence and show progress over time. Without that, cyber resilience remains dependent on goodwill, memory and last-minute effort. Outsourced IT partners Modern companies rely on software providers, outsourced IT partners, consultants, payment systems, logistics platforms, cloud environments and data processors, which means cyber risk rarely sits neatly within the four walls of their organisation. A weakness in one supplier can quickly become a weakness in the business itself. But as the survey shows, only a small minority of organisations are reviewing immediate supplier risk and even fewer are looking at the wider supply chain. Customers are already asking more detailed questions about security controls, investors are looking more closely at operational resilience, regulators are moving towards stronger expectations around supply chain accountability and insurers are becoming more interested in evidence. In that environment, “we trust the supplier” is not enough. Supply chain accountability The UK is moving away from a model where cyber security is largely treated as voluntary good practice and towards one where resilience must be demonstrated. The Bill is part of that shift. Demonstrating that the right controls, oversight and processes were in place before a breach happened relies on evidence, ownership and current information. It requires cyber risk to be connected to compliance, operations, procurement and leadership. This is where many organisations will feel the gap most sharply. They may be doing some of the right things, but if those activities are fragmented, undocumented or disconnected from recognised frameworks, they will struggle to prove it. Evidence-led governance The UK doesn’t have a cyber awareness problem in the traditional sense. Most business leaders understand that attacks can disrupt operations, damage trust and create financial loss. But, businesses need to better understand which frameworks apply, which controls are in place, who owns them, when they were last reviewed and where the evidence sits. That means treating compliance as a live management discipline rather than a project that begins shortly before an audit or customer request. Frameworks such as ISO 27001, SOC 2 and Cyber Essentials are becoming more important because they give organisations a common structure for turning cyber intent into demonstrable control. They also help in moving away from reactive reassurance and towards evidence-led governance. Clear view of resilience The real value in the Cyber Security Breaches Survey is in showing why progress remains slow. Too many businesses are using an approach that creates the appearance of activity without the discipline of governance and, until that changes, the annual numbers will continue to look familiar. To move ahead, businesses need to build the evidence first, connect controls to risk, bring suppliers into scope and give leadership a clear view of resilience before pressure hits. Compliance isn’t a report, it’s a posture – that’s what the latest survey is really telling us.
Access control applications
ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that its AI gun detection and intelligent situational awareness platform has been deployed by New Jersey’s Sayreville Borough School District to protect students and faculty against gun-related violence. Located in Middlesex County, the district serves approximately 6,500 students and employs approximately 750 staff across 10 buildings, including a high school, middle school, upper elementary school, four K–3 elementary schools, two preschools, and a specialised 18–21 program that operates a publicly accessible store and café for job training. With strong community involvement, the district prioritises proactive safety measures and operates on the principle of staying ahead of evolving security needs. Incident management software ZeroEyes enhances the district’s comprehensive, multilayered security strategy and will be integrated with Singlewire’s InformaCast incident management software. This enables real-time gun detection alerts from ZeroEyes to automatically trigger Singlewire’s InformaCast system, which can instantly distribute customised alerts across a wide range of devices, supporting faster, more coordinated emergency responses and ensuring critical information reaches those who need it most. “Our responsibility is to create an environment where students and staff can focus on learning while knowing that safety is taken seriously,” said Dr. Richard Labbe, superintendent of Sayreville Borough School District. “By integrating advanced technology, such as ZeroEyes, into our broader security framework, we are strengthening our ability to identify potential threats early and act quickly, helping us move from awareness to action in a matter of moments.” Secure learning environment ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and school security teams as quickly as 3 to 5 seconds from detection. “Sayreville Borough School District’s leadership has demonstrated a strong commitment to creating a safe and secure learning environment,” said Mike Lahiff, co-founder and CEO of ZeroEyes. “We’re proud to support their efforts by turning existing security infrastructure into a source of timely, reliable insight that supports faster, more confident action.”
ZeroEyes, creators of the multi-analytics weapons detection and threat intelligence platform, announces that Amos P. Godby High School in Tallahassee, Florida, is the first in the nation to deploy a three-part integrated solution called RADAR (Real-time Alert, Detection And Response). This solution combines ZeroEyes’ AI-based gun detection and situational awareness solution with Ark Strategic’s 3D Mapping solution and Campus Guardian Angel drones to provide comprehensive, real-time threat detection, alerting, and response in the case of a gun-related incident. Enhancing situational awareness "ZeroEyes Al gun detection and Ark Strategic’s 3D mapping solution, combined with Campus Guardian Angel, represent the cutting edge of school security in the United States," said Jimmy Williams, Chief of Safety, Security, and Emergency Management for Leon County School District. "When leveraging these tools collectively in Project RADAR, we’re continuing to set a national standard for school security with solution-oriented and mission-ready resources.” Ark Strategic’s 3D mapping solution blends cutting-edge aerial and interior mapping technologies to deliver unparalleled operational intelligence for its customers. When integrating the exterior and interior intelligence with ZeroEyes AI threat detection software, the solution empowers first responders to quickly identify critical assets, enhance situational awareness, and respond to threats with greater speed and precision. Situational awareness software layers “At Ark Strategic, our mission is to turn the entire campus into actionable intelligence,” said Chris Yellina, Founder & Chief Product Officer at Ark Strategic. “With inside-and-out coverage, responders have a clearer picture of the environment before they ever make entry.” ZeroEyes' AI threat detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local security teams as quickly as 3 to 5 seconds from detection. Creating a safer environment When a detection occurs at a location mapped in 3D, each camera alert is automatically tied to its exact position on the map, enabling responders to navigate instantly to the area of concern. The system is entirely cloud-based, requiring no installation for local law enforcement. Annotated maps display camera placement, fields of view, and potential blind spots, while operational layers and interactive measurements empower security teams to assess situations and make informed decisions quickly. In tandem, or if a panic button is pressed, Campus Guardian Angel deploys non-lethal drones within seconds, tracking the assailant and navigating obstacles to provide support and situational awareness. While in operation, the drones actively distract, delay, and disrupt the perpetrator, buying precious time and creating a safer environment for students and staff. Truly comprehensive security solution “Amos P. Godby High School’s deployment of RADAR marks a historic step forward in school safety,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “This integrated and innovative approach further demonstrates how utilising a multilayered technology solution can protect students and staff more effectively, setting a new standard for safety nationwide.” "We are thrilled to partner with the innovative team at ZeroEyes in launching Florida’s first-in-the-nation pilot program, which includes Godby High School, bringing together the best in AI-powered gun detection and elite human-piloted drone response capabilities to create a truly comprehensive security solution that can save lives,” said Justin Marston, CEO and co-founder of Campus Guardian Angel. Enhancing campus safety “Our innovative Active Shooter Suppression System is uniquely designed to deliver non-lethal effects that distract, delay, and disrupt a threat within seconds, buying critical time for law enforcement to protect students and staff. We are proud to be working side-by-side with companies like ZeroEyes to advance cutting-edge technology solutions to enhance campus safety in Florida and across the nation.” ZeroEyes, Ark Strategic, Campus Guardian Angel, and the district are hosting a summit June 17 and 18 at Godby High School, featuring demonstrations and discussion sessions surrounding the technologies, including reflections from school leaders on the district’s successful deployment. The event is open to local schools, law enforcement, and the media.
John Street, Newham, a high‑rise residential development comprising Blocks A and C, has been equipped with a comprehensive life safety solution from Advanced, incorporating SmokeGo smoke control and EvacGo evacuation alert systems to support a stay‑put fire strategy and enhance resident safety. The project, delivered as part of a wider life safety installation by Simple Life Safety Systems Limited, required a robust and compliant approach to smoke control and evacuation alert across two buildings with different heights and risk profiles. Block A is a 14‑storey, high‑rise residential block, while Block C is a smaller, four‑storey building. Each block was equipped with one SmokeGo panel and one EvacGo panel, providing dedicated control tailored to the specific needs of each structure. High‑rise residential block SmokeGo was specified to deliver active smoke control via the fire system, supporting the management of smoke in common escape routes and critical areas. Designed to comply with EN 54 Parts 2 and 4, as well as BS 7346‑8 and ISO 21927‑9, SmokeGo enables automatic and manual control of smoke control fans and dampers from a single, intuitive interface. Its simple matrix‑based configuration allowed the project team to clearly define smoke compartments and cause‑and‑effect relationships, helping ensure smoke is contained and extracted effectively in the event of a fire. EvacGo was installed as a fully independent BS 8629-compliant evacuation alert system, giving the fire and rescue service a reliable and secure means of alerting residents if evacuation beyond the affected flat is required. Each EvacGo panel is housed within a robust, tamper‑proof enclosure and is designed exclusively for use by the fire and rescue service, helping prevent misuse while ensuring clear, decisive control during an incident. Complex residential project John Newton, Director Life Safety at Simple Group, commented: “John Street was a complex residential project that required careful coordination between smoke control and evacuation alert systems. Using SmokeGo and EvacGo allowed us to deliver a fully compliant solution that aligns with the fire strategy while giving the fire and rescue service the tools they need to manage incidents safely and effectively.” The SmokeGo smoke control system and EvacGo evacuation alert system operate as separate dedicated life safety systems, ensuring smoke movement can be actively controlled while evacuation decisions remain firmly in the hands of the fire and rescue service. This layered approach supports resident safety without undermining the stay‑put strategy that underpins the building’s fire design. Implementing smoke control Shaun Scott, Applications Engineer at Advanced, added: “Projects like John Street highlight the importance of implementing smoke control and evacuation alert systems correctly. SmokeGo makes complex smoke control logic far simpler to configure and manage, while EvacGo provides a clear, compliant evacuation alert solution. Together, they deliver confidence for installers, building managers, and emergency responders alike.” With one SmokeGo panel and one EvacGo panel installed in each block, the John Street development now benefits from a coordinated life safety solution that addresses both smoke management and evacuation alerting in line with current best practice and regulatory guidance. The project demonstrates how Advanced’s specialist systems can be combined to meet the evolving safety requirements of modern residential buildings, delivering compliant, practical solutions that prioritise both resident safety and operational simplicity.
Genting Casino at Westfield Stratford City has completed a major fire alarm system upgrade with Comelit-PAC technology, delivered in partnership with installation specialist VTF&S. As the UK’s largest casino floor, including the biggest poker room in the country, Genting Stratford operates around the clock, welcoming visitors day and night. Any upgrade to critical infrastructure needed to be carried out without interrupting the flow of customers and staff, while maintaining strict safety standards throughout. Slowing response times The casino’s previous fire alarm system operated on a closed protocol, which had become increasingly restrictive. Even minor adjustments required specialist call-outs, increasing costs and slowing response times. By contrast, Comelit-PAC’s four-loop fire system offers a more flexible, open protocol approach, enabling easier maintenance and reducing long-term operational expense. The upgrade also ensures improved system reliability and faster fault identification, better suited to the demands of a busy, high-traffic venue. Careful planning and coordination Beyond the technical and visual improvements, the inclusion of Comelit-PAC’s free cloud connection allows the system to be monitored and supported remotely. Secure cloud access enables engineers to diagnose and often resolve issues without waiting for a site visit. The installation was carried out by VTF&S while the casino remained fully operational. Working in a live environment required careful planning and coordination, supported by Comelit-PAC’s technical team. This collaborative approach enabled the upgrade to be delivered with minimal disruption, while also setting the foundation for faster, more cost-effective ongoing support through remote connectivity. Implementing safety and efficiency The project’s success relied on close collaboration between Genting Casino, VTF&S and Comelit-PAC. Clear communication and meticulous planning ensured the system could be upgraded safely and efficiently while the venue continued to operate as normal. Says Ben Howley of Comelit-PAC: “This project demonstrates with the right teamwork and planning, even complex upgrades can be delivered seamlessly in a live venue. Genting Casino now has a system that was implemented safely and efficiently and simple to maintain even remotely, thanks to the strong partnership between all parties involved.”